AP Computer Principles

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
Across
  1. 7. signal that is used to represent data as a sequence of discrete values
  2. 10. Most common format for text files in computers and on the Internet
  3. 11. relating to our using signal is represented by a continuously variable physical quantity
  4. 12. authority: a trusted entity that manages and issues security certificates and public keys used for secure communication in a public network
  5. 13. list of items that are granted access to a certain system or protocol
  6. 14. to store data and perform calculations using only zeros and ones
  7. 20. the use of dedicated websites and applications to interact with other users
  8. 21. the place an active program is running but is not visible to the user
  9. 24. Digital rights management is a systematic approach to copyright protection for digital media
  10. 26. describes how, when and by whom a particular set of data was collected and how data is formed
  11. 27. a unit of information equal to 1 million bytes
  12. 28. Term used to describe unsightly debris that occurs due to digital living
  13. 31. state of being protected against criminal or unauthorized use of electronic data
  14. 34. the address of the world wide web page
  15. 36. the observation that the number of transistors in a dense, integrated circuit doubles approximately every two years
  16. 37. forwarding by a router of a packet from any node to every other node attached to the router
  17. 38. A small amount of data sent over a network which includes a source and destination
  18. 39. event data recorder’s capture information for analysis or better understanding of an event
  19. 41. hypertext markup language is standard text based computer language for creating electronic documents for the web or offline uses
  20. 43. smallest unit of data in a computer
  21. 45. a list of email addresses or domains of known spammers which are considered dangerous
  22. 49. Dynamic random-access memory is a type of random access semiconductor memory that stores each bit of data in a separate tiny capacitator within an integrated circuit
  23. 51. Trusted platform module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
  24. 52. quantities, characters or symbols on which operations are performed by a computer
  25. 53. a group or system of interconnected people or things
  26. 56. term referring to creations of the intellect for which a monopoly is assigned to designated owners by law
  27. 57. a device that allows a computer to read data and/or write data to a disk
  28. 58. request for information from a database
  29. 61. Discreet online resource that is collaboratively developed and managed by a community
  30. 62. the process of converting information or data into a code, especially to prevent unauthorized access
  31. 64. describes the method of converting data for storage or transmission
  32. 65. to copy data from one computer system to another, typically over the Internet
  33. 66. the process of examining large databases in order to generate new information
  34. 67. the art of writing or solving codes
  35. 69. enterprise data storage entity in which data has been specifically partitioned for an analytical or reporting purpose
  36. 70. the online world of computer networks and especially the Internet
  37. 71. something that is created dynamically according to the needs of the data user
  38. 74. an instance of a program running in a computer which is started when the program is initiated
  39. 75. primary location from where data, such as a database, data set or spreadsheet
Down
  1. 1. Collection of documents about a person, event or subject
  2. 2. expressed as a series of zero and one, typically represented by values of a physical quantity
  3. 3. Algorithm for performing encryption or decryption - a series of steps that can be followed as a procedure - which converts plain text into a coded set of data
  4. 4. the practice of using a network of remote servers hosted on the Internet to store, manage and process data
  5. 5. Central location in which data is stored and managed
  6. 6. a minute area of illumination on a display screen, one of many from which an image is come
  7. 8. system that transfers data between network access points known as nodes through data switching, system control and interconnection transmission lines
  8. 9. a rectangular pattern of parallel scanning lines followed by the electron beams on a TV screen or computer monitor
  9. 15. any letter, number, punctuation mark or symbol that can be typed
  10. 16. well-defined procedure that allows computers to solve a problem
  11. 17. any process in which information is gathered and expressed in a summary form
  12. 18. use of interactive, sensory representations of abstract data to reinforce cognition, hypothesis building and reasons
  13. 19. An automated program that runs over the Internet - a computer program that executes a specific task according to the users instructions
  14. 22. a large group of network computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data
  15. 23. radio frequency identification is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum
  16. 25. Collection of hardware and software needed to have a working system
  17. 29. a unit of graphic solution equivalent to 1 million pixels
  18. 30. an identifier for devices on the TCP/IP network
  19. 32. A class of data compression algorithms that allows original data to be perfectly reconstructed from compressed data
  20. 33. encryption standard developed by IBM - data encryption standard is a block cipher thus applying cryptographic key and algorithms to a block of data rather than one bit at a time
  21. 35. reduces a file by permanently eliminating certain information
  22. 40. a unit of information equal to 1 billion bytes
  23. 42. process of taking encoded text or other data and converting it back to a text that you or the computer can read and understand
  24. 44. into relationship among data elements that determine how data is recorded, manipulated, stored and presented in a database
  25. 46. A type of computing architecture where all or most of the processing is performed on a central server
  26. 47. computer program that analyzes data in order to translate it to a form acceptable to the computer
  27. 48. any computing hardware that is used for storing, porting and extracting data files
  28. 50. the process of representing a real world object or phenomenon as a set of mathematical equations
  29. 54. software used to organize and analyze data
  30. 55. process of generating an image from a model using computer programs
  31. 59. Part of a computer system that is designed to block unauthorized access while permitting outward communication
  32. 60. practice of sending unwanted email messages, frequently with commercial content
  33. 63. contains the applications the user is working on - a priority assigned to programs running in a multitasking environment
  34. 68. To store data locally in order to speed up subsequent retrievals
  35. 72. recognition of printed or written text characters by a computer - optical character recognition
  36. 73. Advanced encryption standard is a symmetric block cipher to protect classified information and is implemented in software and hardware to encrypt sensitive data